An error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.
--------------------------------------------------------------------- â ï¼ç·æ¥ï¼BIND 9.xã®èå¼±æ§ï¼DNSãµã¼ãã¹ã®åæ¢ï¼ã«ã¤ãã¦ï¼2015å¹´7æ8æ¥å ¬éï¼ - DNSSECæ¤è¨¼ãæå¹ã«è¨å®ããã¦ããå ´åã®ã¿å¯¾è±¡ããã¼ã¸ã§ã³ã¢ãããå¼·ãæ¨å¥¨ - æ ªå¼ä¼ç¤¾æ¥æ¬ã¬ã¸ã¹ããªãµã¼ãã¹ï¼JPRSï¼ åç使 2015/07/08ï¼Wedï¼ --------------------------------------------------------------------- â¼æ¦è¦ BIND 9.xã«ãããå®è£ ä¸ã®ä¸å ·åã«ãããnamedã«å¯¾ããå¤é¨ããã®ãµã¼ã ã¹ä¸è½ï¼DoSï¼æ»æãå¯è½ã¨ãªãèå¼±æ§ããéçºå ã®ISCããçºè¡¨ããã¾ããã æ¬èå¼±æ§ã«ãããæä¾è ãæå³ããªããµã¼ãã¹ã®åæ¢ãçºçããå¯è½æ§ãã ãã¾ãã 該å½
--------------------------------------------------------------------- â BIND 9.xã®èå¼±æ§ï¼DNSãµã¼ãã¹ã®åæ¢ï¼ã«ã¤ãã¦ï¼2015å¹´2æ19æ¥å ¬éï¼ - DNSSECæ¤è¨¼ã宿½ãã¦ããDNSãµã¼ãã¼ã®ã¿å¯¾è±¡ããã¼ã¸ã§ã³ã¢ãããå¼·ãæ¨å¥¨ - æ ªå¼ä¼ç¤¾æ¥æ¬ã¬ã¸ã¹ããªãµã¼ãã¹ï¼JPRSï¼ åç使 2015/02/19ï¼Thuï¼ --------------------------------------------------------------------- â¼æ¦è¦ BIND 9.xã«ãããå®è£ ä¸ã®ä¸å ·åã«ãããnamedã«å¯¾ããå¤é¨ããã®ãµã¼ã ã¹ä¸è½ï¼DoSï¼æ»æãå¯è½ã¨ãªãèå¼±æ§ããéçºå ã®ISCããçºè¡¨ããã¾ããã æ¬èå¼±æ§ã«ãããæä¾è ãæå³ããªããµã¼ãã¹ã®åæ¢ãçºçããå¯è½æ§ãã ãã¾ãã 該å½ãã
--------------------------------------------------------------------- â ï¼ç·æ¥ï¼BIND 9.10.xã®èå¼±æ§ï¼DNSãµã¼ãã¹ã®åæ¢ï¼ã«ã¤ãã¦ï¼2014å¹´6æ12æ¥å ¬éï¼ - ãã£ãã·ã¥ï¼æ¨©å¨DNSãµã¼ãã¼ã®åæ¹ã対象ããã¼ã¸ã§ã³ã¢ãããå¼·ãæ¨å¥¨ - æ ªå¼ä¼ç¤¾æ¥æ¬ã¬ã¸ã¹ããªãµã¼ãã¹ï¼JPRSï¼ åç使 2014/06/12ï¼Thuï¼ --------------------------------------------------------------------- â¼æ¦è¦ BIND 9.10.xã«ãããå®è£ ä¸ã®ä¸å ·åã«ãããnamedã«å¯¾ããå¤é¨ããã®ãµã¼ ãã¹ä¸è½ï¼DoSï¼æ»æãå¯è½ã¨ãªãèå¼±æ§ããéçºå ã®ISCããçºè¡¨ããã¾ã ããæ¬èå¼±æ§ã«ãããæä¾è ãæå³ããªããµã¼ãã¹ã®åæ¢ãçºçããå¯è½æ§ ãããã¾ãã
CVE-2014-3859: BIND named can crash due to a defect in EDNS printing processing Prev Next A specially crafted query sent to a BIND nameserver can cause it to crash with a REQUIRE assertion error. CVE:Â CVE-2014-3859 Document version: 2.0 Posting date:Â 11 June 2014 Program impacted:Â BIND 9 Versions affected:Â 9.10.0, 9.10.0-P1 Severity:Â Critical Exploitable:Â Remotely Description: A query specially cr
--------------------------------------------------------------------- â ï¼ç·æ¥ï¼BIND 9.10.0ã®èå¼±æ§ï¼DNSãµã¼ãã¹ã®åæ¢ï¼ã«ã¤ãã¦ï¼2014å¹´5æ9æ¥å ¬éï¼ - BIND 9.10.0ã®ãã£ãã·ã¥DNSãµã¼ãã¼ã対象ããã¼ã¸ã§ã³ã¢ãããå¼·ãæ¨å¥¨ - æ ªå¼ä¼ç¤¾æ¥æ¬ã¬ã¸ã¹ããªãµã¼ãã¹ï¼JPRSï¼ åç使 2014/05/09ï¼Friï¼ --------------------------------------------------------------------- â¼æ¦è¦ BIND 9.10.0ã«ãããå®è£ ä¸ã®ä¸å ·åã«ãããnamedã«å¯¾ããå¤é¨ããã®ãµã¼ ãã¹ä¸è½ï¼DoSï¼æ»æãå¯è½ã¨ãªãèå¼±æ§ããéçºå ã®ISCããçºè¡¨ããã¾ã ããæ¬èå¼±æ§ã«ãããæä¾è ãæå³ããªããµã¼ãã¹ã®åæ¢ãçºçããå¯è½æ§ ã
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã¡ã³ããã³ã¹
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}